Which of the following audit techniques is MOST appropriate for verifying application program controls?